Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/08/2024, 19:06
Static task
static1
Behavioral task
behavioral1
Sample
945b60900827ea5a4cd42270f5f29b64_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
945b60900827ea5a4cd42270f5f29b64_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
945b60900827ea5a4cd42270f5f29b64_JaffaCakes118.html
-
Size
2KB
-
MD5
945b60900827ea5a4cd42270f5f29b64
-
SHA1
1db8310bcc9d33dd53ecf037c47c838673c5909d
-
SHA256
96710ef86c81d51b1c06eb733a1f1e21af4391029b142a03d779f57c41135124
-
SHA512
578d712bae6eb7992280fc6ebdcd985938ded97bfe65e5050018d2bc3b1c72d7716897cba313ee07871f115986a60d9f636a31db96deb89ecb879ae2841292db
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb780000000002000000000010660000000100002000000095928fa28328f584cb7c4c7853064d5a858876b996fe682cba21df119ce9fcdd000000000e8000000002000020000000e857fc7c6ca1397111087afbf3a11dd1ee77e515d108286b961c8b9a1d3c252c90000000368dd64e73148cb3e383fd0bcc996ae7c76cde8cf47016755bc441f55e405f75570f3e582ea775f97536c73dcb2f320feb9c0c725636fcd67b6dc726c4fd1f4b2bb58093e3396c6e2c3ee44e74be5db888ad8554e32244e45db29ecc695637b7838c7f4b7d3f56e681d342d1fd6c44d6dfb8f5e9eb5c62a28880d21ec606c5722edf399e99040712a088c193123c44e74000000051c0ee63edcdc444ee6b3739e9c0b664d7b9c0f4d64f203d36bb3ff240bf7ab23ad6aa1b4e53f9266660d96944b776c98db5e1c6d04c6a316f062ee39474f6f5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40086605b4edda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429737868" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2C8171D1-59A7-11EF-B5B5-D238DC34531D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb780000000002000000000010660000000100002000000088183fd97597227b1f04c529ed603b5af8f00a312ab1166d0089a5c45bbf61a1000000000e80000000020000200000000911e968fe791404d080e840603bb070bf868cf38b9aa2766074ca36416c96e0200000004ad58725be292264588ff66b9dedaa8975b9a5f317563f46ac9f46d912e7898b40000000e1594be71adbe7b5d6bfe692c3de5f14a20f4e72872f2e32e385c979b0f76420cb4f72d8ad019de30b53fc15e929a482a8d1b10e47d5cf51d3616dcba0943a4d iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2948 iexplore.exe 2948 iexplore.exe 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2948 wrote to memory of 2460 2948 iexplore.exe 30 PID 2948 wrote to memory of 2460 2948 iexplore.exe 30 PID 2948 wrote to memory of 2460 2948 iexplore.exe 30 PID 2948 wrote to memory of 2460 2948 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\945b60900827ea5a4cd42270f5f29b64_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2948 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556b80850ddf81c240530b9a1115eb257
SHA149115a8b3611b5c4974fb169d6555f277ea09f3d
SHA2562b10fc48c03567ac90b48a2b515c5118026a674915455509885792f4395bcaae
SHA51266690ed93f4b79a88eaa3c8f36688b43f208b9bfe0cf1c8be2da197298c665482920882882157b3998c10899780ce243f2aba34cc77da6e80e6dcd98c25356f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54038311b59f8191f21e1f71919ac4937
SHA1f84c0bdf5d89851db2cd4fc5ba329b7fac64f215
SHA2564c511e6037e36ef703fa63abcd359e54e7ce243b7b919daca72b91e230826660
SHA51200476d2fd4794466229ff5629c7e82d56fa5b26052685d469538fff704ad68f8e0d1db94a3592762a790e1773eb401386beea9cb12af904d5ae4d7d64306e3a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8ada36b3e8c58c673057b4721698340
SHA1d04ff1905030c821646446313fb3ce54aa19d0ed
SHA256b7654726b8518e2987917513a78adb464eda47508cc9c3e07c68aa15a703ea0c
SHA512a5ede565e18b3d3f76b31d82dca409d6ce47d447020fb372e252c9a5cbe9372416e9c9718301f565ce02521b9a212fff9c44db06cad1a434e7c73c51f33cc351
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577afb326fcaa2f24133d2d620039cafe
SHA1c158d51bace49697479f589ec1d53d993fdcdd26
SHA2562026be2ea80eb043daf2c2f5a86f5fe8c384d35a18aff6bc6ad8cc79cfb986ec
SHA512e014266382b91a29a9dc86a64ffe2dbf80ef78a9ff12d30b4d46dbef79103f16a293276f806450442bf76710b41adadb2ad53d9a08b6c578fc40695e2b983dac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5accb283342023036ad428a2f4a6e88e0
SHA1b5f3b74d9e1610a676a09657f93c619b9745fc04
SHA25667b38fcca4ac9ae2929468832228ea51dcd9d1526bf9951298a3d686646e5c3b
SHA51268e6213c6667387ea3081d35e01d6f9fd255b063129746afbc4390ecc6d8c69419b696a3d773efd0bb1b7c715456a436652738ac33989bb6c2923bfc9ad1a0cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583cb78e715b6e7d45adfd4ad54da043a
SHA111332307778ee8de6ca4be71aaec5d570d886f19
SHA2565b3bd5d38991373fbef69b717cc8c58474780cf2b05ed53da6288103f63f69d6
SHA5125ddb66753b1fca7828bf38149b8fa8b1fae5ca2fa063b3eab841196d418f45b64a030fb9a906155045b50cb3aa2358d886ad81b967d9970382452bdcc32ccd9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e98dfd78f8571501e80ae745eff27be6
SHA17e30edb7828d84ee578084eed536c560323d4adf
SHA2560590eb37a525ccf198827db921defb49b629f432a17995401496466406773308
SHA512e601991c948e35a0232a259696ccf5d6edeb16ea23c9524f9def358493abbb89fb9c5c1daf31006f02a1c9b25e98732bfbb584e6fd0ec239d3ff89a878577bd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f2914fa8c93e5dc936cb7622f3eb3f0
SHA13d99e9a2cb71a384c2e21cdc935db4148bf34b89
SHA25650b242f759c4698d5aad20ade9c5153897a393ce28a819af736a64d6cd170112
SHA512ea33f7b207afd8f98c838b652236bda3f4307f557a9006c0660aabe7583f06eef9193223aff1e5380d3c452fc4cfd48587c3c216f7d911cf022b4435053d029c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56db9699b6ab7845280f8b6232fe0e60d
SHA1a5a55ae3a3861d864d625c257346abd962b39d6d
SHA256fe56fc194c3365b1fe549f02a5131c4aa5cafd47888a6ec560ba22f6a5628da7
SHA512db2d49a34276aa7f4475c7a4ef0a01435476fa6da438536ec74bb04124dff6420666a7534f28d4667f08be23cfe8ff0577a44c030e1680ebe9010af057815c63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5217d4884e0655087bb71f0b7b02b5132
SHA1383adb889263fb3ef24bb8e9d0383ccf3581b7d6
SHA256a8edae46b07eb2f8fa12426bb65c8925c05a92d8feaa485c14b57fa3a6e004bb
SHA512f17c91812a34f57d8036ff1c352e32e4c76d6055f5394e7ca6cb7e513d80090ddacb65beef2e45397e385ffa96380e4eb07bf14418ede689d875f8721f656ead
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5fdc3ed9bae6d94338e3b53a62b683c
SHA11bacbc9230f794b407107fa838fe99cbe10af3bc
SHA256b9a42b9a16aa94878f93e3a541317885957fca9ea30a701d486c56bcccd74b1b
SHA512d7d3d6a1e02f2eb3cd6eaf342a94b76b9cdd0c0f1cbaf69ef1e22ebcc65154dd8b0814af2b4f754ab776391b27aa3591ac0346a1d7261973b7799a8fbdaab0b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c812bce351931fb077cc7160e4c2064
SHA19d9564df28cf63e884bf617e8aff1e6786c82db9
SHA2562e55a56ce5981a0ee36bbc0bb6e6760fbf63ac0c705ef32a8c69d9ea1f69082d
SHA5121d33d22befbb1a509091d59f3e0644be4299d4cba12a4f7891c953ba1f4b636eedfadc065c51eff5a576674663fd46139c0db970967c612d7099f7f25add684e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b464e789c5b4516ba51bd7862b8dc47
SHA147b1b0015a1742958466ccd1b77d8b4d2032d137
SHA25678ed256cf81cb47d0077378303c0e8af13cf55cadd113480ce5d26faf8be5f18
SHA5126ae2c7e9c085a68d71a48ee3da3b4fbe1f10eda622e9c43783ef5c1f8f959cec19c74d7bbae6fb06268494b5c3429dc922094b7b2d39d6bae6e77e314055c195
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50397fa236300e1d10bda401791688342
SHA15c2f04f2d293d2667777ec0e4eb6354814189262
SHA256d943e4a72c907738dfb79ae1c5685bee9d5c8bd251e7747c7c256e2e86fda470
SHA5129a0d3a2b5151a1c90b837374e779d583841654bcb4a5a761d02a558856bf605e89af375fdec1c41253f781e834679498830e1421c83ac174c320458465ac066e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b4a626748c72289b987afb54dbe1e0a
SHA158f7995f54f1008e4680e804c396f0fa1f89389f
SHA256874b96b67bcf82a533e556f1f5e4ddccd8a6993c427bd29497fc1a0de1d42601
SHA51206ddec57bfe8aca788317788c5e53043cc677c8e77ec339fab17e1df8beafff024d3bc5b7224a182844d0cdffb3832a29dd8f51113753f8f509ff522895c2777
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ac277f7d734f8d8872d8815ccf13590
SHA1033e485ed70851a651e36d64ffc80e411c14e6a5
SHA256adfac77556f716918f9d7029a8d6eab0610625cf0132aafbd60542a586ad7ab7
SHA512d9582b8076d0cc3650e5a010d3bc5fdca5fd8910f482ce27c2c2828e30ae29afaa5854a7d8d994733d9c9582bf72c196ddee02d3b8355db500a7b315e3c3f07d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a693b16449cb532d0d8cdd14ebade532
SHA10dae78ad4c6e1bebf876e18294ac163444cb910e
SHA25690b79ddd129dcbe5946baf486e3d112fa8d40b5c41623a7c49e45eb65f32e9ff
SHA512afd73b339be38e8c61d43bfec537824bfa86cf4e2fc5120aa99f379f0991aacca21e413d68ec161016de806ab0d445fcbd46b97767cc019a413ba4fcf687dfea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c07bd241c8d744c86710ae26c3d7cb70
SHA1fb5229da1ce0c44ea2164d7ea13b53b98ebaf919
SHA25655f4583385976ea29ab66e6a4f010ec8e810fd593ef498cccf1298a3333d5ec7
SHA512e77e24f56d321b5b6c18b949f3bf583c5731e04517f64b031c5966c7e600f3a67900cc47fc0838ddbef208807fbba24f5732637dda17decf6e7766c5b9128265
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b